There is a lack of input validation for user-provided values in certain functions.
In the GitForge.get_repo() function for GitHub, the user can provide any string for the owner and repo fields. These inputs are not validated or safely encoded and are sent directly to the server.
This means a user can add path traversal patterns like ../ in the input to access any other endpoints on api.github.com that were not intended.
Users should upgrade immediately to v0.4.3. All prior versions are vulnerable.
None
Fixed by: https://github.com/JuliaWeb/GitForge.jl/pull/50 (which is available in v0.4.3).
Thanks to splitline from the DEVCORE Research Team for reporting this issue.
{
"license": "CC-BY-4.0",
"sources": [
{
"published": "2025-06-24T23:01:20Z",
"url": "https://api.github.com/repos/JuliaWeb/GitForge.jl/security-advisories/GHSA-g2xx-229f-3qjm",
"modified": "2025-06-24T23:01:20Z",
"html_url": "https://github.com/JuliaWeb/GitForge.jl/security/advisories/GHSA-g2xx-229f-3qjm",
"id": "GHSA-g2xx-229f-3qjm",
"imported": "2025-10-07T02:52:16.795Z"
}
]
}